Skip to main content

Log Search

Log Search allows you to query and analyze log data sent to Sumo Logic. There are many features to help you use our robust Search Query Language, such as LogCompare, LogReduce, LogExplain, Lookup Tables, Subqueries, and Time Compare. See Get Started with Search to begin exploring your data in Sumo Logic.


In this section, we'll introduce the following concepts:


Getting started with Log Search

Start here to begin exploring your data in Sumo Logic.


Search Query Language

The extensive Sumo Logic query options help you gain valuable insight into your log messages.


Search Cheat Sheets

Cheat sheets provide examples of useful search queries for different use cases.



Quickly assess activity patterns for things like a range of devices or traffic on a website.



Easily compare log data from different time periods to detect major changes or anomalies.


Lookup Tables

Learn about Lookup tables and the search operators you can use with them.


Live Tail

Real-time live feed of log events associated with a Source or Collector.


Behavior Insights

Gain behavioral insight of your environment using LogReduce operators.



Filter and evaluate conditions for a query when you may not be sure of the exact filter.


To interact with other Sumo Logic users, post feedback, or ask a question, visit the Sumo Logic Community Search & Query Forum.

Partitions and Views

Logs collected by Sumo Logic are indexed in Partitions and Scheduled Views. In addition, there are internal indexes such as Health Events, Archive, Audit, and Volume indexes.

Data Tiers

Data Tiers provide the ability to allocate data to different storage tiers based on the frequency of access: Continuous, Frequent, and Infrequent.

To search specific Data Tiers. See Searching Data Tiers.


Traces are collected with SumoLogic Kubernetes Collection or a standalone OpenTelemetry collector through an HTTP Traces Source.

Privacy Statement
Terms of Use

Copyright © 2024 by Sumo Logic, Inc.